Journal articles on the topic 'Eventus (Computer file)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Eventus (Computer file).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Syafar, Faisal, Halimah Husain, Sutarsih Suhaeb, Putri Ida, and Supriadi. "Blowfish Advanced CS Untuk Solusi Keamanan Sistem Komputer Sekolah." Vokatek : Jurnal Pengabdian Masyarakat 1, no. 3 (2023): 353–61. http://dx.doi.org/10.61255/vokatekjpm.v1i3.271.
Full textJawad, Alkenani, and Ahmed Nassari Khulood. "Enhance work for java based network analyzer tool used to analyze network simulator files." Enhance work for java based network analyzer tool used to analyze network simulator files 29, no. 2 (2023): 954–62. https://doi.org/10.11591/ijeecs.v29.i2.pp954-962.
Full textXu, Haochen, Guanhua Fang, Yunxiao Chen, Jingchen Liu, and Zhiliang Ying. "Latent Class Analysis of Recurrent Events in Problem-Solving Items." Applied Psychological Measurement 42, no. 6 (2018): 478–98. http://dx.doi.org/10.1177/0146621617748325.
Full textAlkenani, Jawad, and Khulood Ahmed Nassar. "Enhance work for java based network analyzer tool used to analyze network simulator files." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 2 (2023): 954. http://dx.doi.org/10.11591/ijeecs.v29.i2.pp954-962.
Full textGroh, Micah, Norman Buchanan, Derek Doyle, James B. Kowalkowski, Marc Paterno, and Saba Sehrish. "PandAna: A Python Analysis Framework for Scalable High Performance Computing in High Energy Physics." EPJ Web of Conferences 251 (2021): 03033. http://dx.doi.org/10.1051/epjconf/202125103033.
Full textMarr, Charles. "210 CUSTOM-PRINTED ELECTRONIC FACT SHEETS AT HORTICULTURAL EVENTS." HortScience 29, no. 5 (1994): 459d—459. http://dx.doi.org/10.21273/hortsci.29.5.459d.
Full textBántay, László, Gyula Dörgö, Ferenc Tandari, and János Abonyi. "Simultaneous Process Mining of Process Events and Operator Actions for Alarm Management." Complexity 2022 (September 19, 2022): 1–13. http://dx.doi.org/10.1155/2022/8670154.
Full textMarjai, Péter, Péter Lehotay-Kéry, and Attila Kiss. "The Use of Template Miners and Encryption in Log Message Compression." Computers 10, no. 7 (2021): 83. http://dx.doi.org/10.3390/computers10070083.
Full textStarenkyi, Ivan, and Oleksandra Donchenko. "DETECTION OF TRACES OF THE USE OF SOFTWARE SUCH AS «STEALER» IN THE MEMORY OF THE STORAGE DEVICE." Criminalistics and Forensics, no. 68 (July 3, 2023): 469–77. http://dx.doi.org/10.33994/kndise.2023.68.46.
Full textN. Sangeeta and Seung Yeob Nam. "Blockchain and Interplanetary File System (IPFS)-Based Data Storage System for Vehicular Networks with Keyword Search Capability." Electronics 12, no. 7 (2023): 1545. http://dx.doi.org/10.3390/electronics12071545.
Full textMohamed, Mohamed, and James C. L. Chow. "Acomprehensive computer database for medical physics on-call program." Journal of Radiotherapy in Practice 19, no. 1 (2019): 10–14. http://dx.doi.org/10.1017/s1460396919000244.
Full textEljack, Sarah, Mahdi Jemmali, Mohsen Denden, et al. "A secure solution based on load-balancing algorithms between regions in the cloud environment." PeerJ Computer Science 9 (December 1, 2023): e1513. http://dx.doi.org/10.7717/peerj-cs.1513.
Full textRyasov, Aleksandr. "THE POSSIBILITY OF OBTAINING AND USING CRIMINALLY SIGNIFICANT INFORMATION FROM FILE METADATA IN THE DETECTION AND INVESTIGATION OF CRIMES." VESTNIK ADVANCED TRAINING INSTITUTE OF THE MIA OF RUSSIA, no. 2 (August 12, 2024): 110–16. http://dx.doi.org/10.29039/2312-7937-2024-2-110-116.
Full textSmith, Glenn Gordon, and Barry Grant. "From Players to Programmers: A Computer Game Design Class for Middle-School Children." Journal of Educational Technology Systems 28, no. 3 (2000): 263–75. http://dx.doi.org/10.2190/rvx6-61b0-8m2q-dul3.
Full textSyed, Salma, Nadimpalli Usha Deepa Sundari, Satish Babu Dogiparti, et al. "An intelligent approach to design big data on e-commerce in cloud computing environment." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 3 (2025): 3439. https://doi.org/10.11591/ijece.v15i3.pp3439-3448.
Full textKim, Ye, A. Alimbekova, А. Gavrilova, and А. Kan. "DEVELOPMENT OF A COMPUTER-BASED EDUCATIONAL PROGRAM ON THE SUBJECT "FUNDAMENTALS OF COMPUTER MODELING"." Automation of technological and business processes 16, no. 2 (2024): 47–54. http://dx.doi.org/10.15673/atbp.v16i2.2851.
Full textHidayat, Arif, Sudarmaji ., Dharmawan ., et al. "Comparative Analysis Of Applications OSforensics, GetDataBack, Genius and Diskdigger On Digital Data Recovery in the Computer Device." International Journal of Engineering & Technology 7, no. 4.7 (2018): 445. http://dx.doi.org/10.14419/ijet.v7i4.7.27356.
Full textPeditto, Matteo, Riccardo Nucera, Erasmo Rubino, et al. "Improving Oral Surgery: A Workflow Proposal to Create Custom 3D Templates for Surgical Procedures." Open Dentistry Journal 14, no. 1 (2020): 35–44. http://dx.doi.org/10.2174/1874210602014010035.
Full textAlnajjar, Ibrahim Ali, and Massudi Mahmuddin. "The Enhanced Forensic Examination and Analysis for Mobile Cloud Platform by Applying Data Mining Methods." Webology 18, SI01 (2021): 47–74. http://dx.doi.org/10.14704/web/v18si01/web18006.
Full textMorillo Reina, J. D., and T. J. Mateo Sanguino. "Decentralized and Secure Blockchain Solution for Tamper-Proof Logging Events." Future Internet 17, no. 3 (2025): 108. https://doi.org/10.3390/fi17030108.
Full textHe, Hai-yan, Chih-Yang Lin, and Hollis T. Cline. "In Vivo Time-Lapse Imaging and Analysis of Dendritic Structural Plasticity in Xenopus laevis Tadpoles." Cold Spring Harbor Protocols 2022, no. 1 (2021): pdb.prot106781. http://dx.doi.org/10.1101/pdb.prot106781.
Full textHaislip, Jacob Z., Khondkar E. Karim, Karen Jingrong Lin, and Robert E. Pinsker. "The Influences of CEO IT Expertise and Board-Level Technology Committees on Form 8-K Disclosure Timeliness." Journal of Information Systems 34, no. 2 (2019): 167–85. http://dx.doi.org/10.2308/isys-52530.
Full textLei, Yan, Linxiang He, and Houqiang Huang. "Enhancement of Nursing Effect in Emergency General Surgery Based on Computer Aid." Journal of Healthcare Engineering 2022 (March 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/6745993.
Full textGouveia, José Rafael Ferreira de, and Cristina Rodrigues Nascimento. "Uso e Cobertura do Solo após Eventos de Queimadas no Município de Floresta em Pernambuco." Revista Brasileira de Geografia Física 15, no. 6 (2022): 3121–35. http://dx.doi.org/10.26848/rbgf.v15.6.p3121-3135.
Full textKobayashi, Kent D., and H. C. Bittenbender. "155 Farmer's Bookshelf: Evolution of an Information System for Crops in Hawaii." HortScience 34, no. 3 (1999): 468E—469. http://dx.doi.org/10.21273/hortsci.34.3.468e.
Full textMueggler, Elias, Henri Rebecq, Guillermo Gallego, Tobi Delbruck, and Davide Scaramuzza. "The event-camera dataset and simulator: Event-based data for pose estimation, visual odometry, and SLAM." International Journal of Robotics Research 36, no. 2 (2017): 142–49. http://dx.doi.org/10.1177/0278364917691115.
Full textSezonov, V. S. "The concept of a document in jurisprudence." Law and Safety 82, no. 3 (2021): 200–208. http://dx.doi.org/10.32631/pb.2021.3.23.
Full textPoquerusse, M., and P. S. McIntosh. "Type III Radio Burst Productivity of Solar Flares." International Astronomical Union Colloquium 104, no. 2 (1989): 177–80. http://dx.doi.org/10.1017/s0252921100154107.
Full textPatil, Anand N., and Sujata V. Mallapur. "Novel machine learning based authentication technique in VANET system for secure data transmission." Journal of Autonomous Intelligence 6, no. 2 (2023): 828. http://dx.doi.org/10.32629/jai.v6i2.828.
Full textSugier, Jarosław. "Scripting Scenarios of Pedestrian Behavior in a Computer Simulator of Security Monitoring System: A Practitioner’s Perspective." Transport and Telecommunication Journal 24, no. 4 (2023): 349–60. http://dx.doi.org/10.2478/ttj-2023-0027.
Full textColligan, Thomas, Kayla Irish, Douglas J. Emlen, and Travis J. Wheeler. "DISCO: A deep learning ensemble for uncertainty-aware segmentation of acoustic signals." PLOS ONE 18, no. 7 (2023): e0288172. http://dx.doi.org/10.1371/journal.pone.0288172.
Full textMarjai, Péter, Péter Lehotay-Kéry, and Attila Kiss. "A Novel Dictionary-Based Method to Compress Log Files with Different Message Frequency Distributions." Applied Sciences 12, no. 4 (2022): 2044. http://dx.doi.org/10.3390/app12042044.
Full textMachard, Anaïs, Christian Inard, Jean-Marie Alessandrini, Charles Pelé, and Jacques Ribéron. "A Methodology for Assembling Future Weather Files Including Heatwaves for Building Thermal Simulations from the European Coordinated Regional Downscaling Experiment (EURO-CORDEX) Climate Data." Energies 13, no. 13 (2020): 3424. http://dx.doi.org/10.3390/en13133424.
Full textKern, Fabian, Jeremy Amand, Ilya Senatorov, et al. "miRSwitch: detecting microRNA arm shift and switch events." Nucleic Acids Research 48, W1 (2020): W268—W274. http://dx.doi.org/10.1093/nar/gkaa323.
Full textEt.al, Ms Hepisuthar. "Comparative Analysis Study on SSD, HDD, and SSHD." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 3635–41. http://dx.doi.org/10.17762/turcomat.v12i3.1644.
Full textSzpyrka, Marcin, Edyta Brzychczy, Aneta Napieraj, Jacek Korski, and Grzegorz J. Nalepa. "Conformance Checking of a Longwall Shearer Operation Based on Low-Level Events." Energies 13, no. 24 (2020): 6630. http://dx.doi.org/10.3390/en13246630.
Full textKrämer, Stefan D., Johannes Wöhrle, Christin Rath, and Günter Roth. "Anabel: An Online Tool for the Real-Time Kinetic Analysis of Binding Events." Bioinformatics and Biology Insights 13 (January 2019): 117793221882138. http://dx.doi.org/10.1177/1177932218821383.
Full textAli, Moch Dzikri Azhari, Asep Id Hadiana, and Melina Melina. "Securing Network Log Data Using Advance Encryption Standard Algorithm And Twofish With Common Event Format." International Journal of Quantitative Research and Modeling 5, no. 3 (2024): 341–53. https://doi.org/10.46336/ijqrm.v5i3.757.
Full textYang, Jing. "Media Evolution, “Double-edged Sword” Technology and Active Spectatorship: investigating “Desktop Film” from media ecology perspective." Lumina 14, no. 1 (2020): 125–38. http://dx.doi.org/10.34019/1981-4070.2020.v14.30260.
Full textManihda, O. V., and V. A. Hnera. "PREFERENCES OF USING GEOINFORMATION SYSTEMS FOR FIXATION ON ARCHAEOLOGICAL OBJECTS." Archaeology and Early History of Ukraine 30, no. 1 (2019): 218–30. http://dx.doi.org/10.37445/adiu.2019.01.17.
Full textPrime, Sunantha. "Forecasting the changes in daily stock prices in Shanghai Stock Exchange using Neural Network and Ordinary Least Squares Regression." Investment Management and Financial Innovations 17, no. 3 (2020): 292–307. http://dx.doi.org/10.21511/imfi.17(3).2020.22.
Full textKumar, Vijay, and Talwinder Kaur. "Cloud Functions and Serverless Computing." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 3426–27. http://dx.doi.org/10.22214/ijraset.2022.43163.
Full textKumar, Vijay. "Cloud Functions Using Server less Computing." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (2021): 418–19. http://dx.doi.org/10.22214/ijraset.2021.37986.
Full textChun, Hein, and Sangwoo Kim. "BAMixChecker: an automated checkup tool for matched sample pairs in NGS cohort." Bioinformatics 35, no. 22 (2019): 4806–8. http://dx.doi.org/10.1093/bioinformatics/btz479.
Full textBaftiu, Naim, and Raif Bytyqi. "APPLICATION OF BLASTWARE SOFTWARE FOR MEASURING MICROCOLIMIC CONDITIONS." Teacher of the future 31, no. 4 (2019): 1093–98. http://dx.doi.org/10.35120/kij31041093b.
Full textGhozia, Ahmed, Gamal Attiya, Emad Adly, and Nawal El-Fishawy. "Intelligence Is beyond Learning: A Context-Aware Artificial Intelligent System for Video Understanding." Computational Intelligence and Neuroscience 2020 (December 23, 2020): 1–15. http://dx.doi.org/10.1155/2020/8813089.
Full textGómez-Déniz, Emilio, and Enrique Calderín-Ojeda. "A Priori Ratemaking Selection Using Multivariate Regression Models Allowing Different Coverages in Auto Insurance." Risks 9, no. 7 (2021): 137. http://dx.doi.org/10.3390/risks9070137.
Full textPhilp, Cassie, Barbara Geller, and Fiona Alexander. "Psychiatric Induction Programme in Fife." BJPsych Open 8, S1 (2022): S170. http://dx.doi.org/10.1192/bjo.2022.475.
Full textYang, Ting, Guanghua Zhang, Yin Li, Yiyu Yang, He Wang, and Yuqing Zhang. "Detecting Privacy Leakage of Smart Home Devices through Traffic Analysis." Security and Communication Networks 2022 (July 15, 2022): 1–10. http://dx.doi.org/10.1155/2022/5655314.
Full textDavis, Allan Peter, Thomas C. Wiegers, Cynthia J. Grondin, et al. "Leveraging the Comparative Toxicogenomics Database to Fill in Knowledge Gaps for Environmental Health: A Test Case for Air Pollution-induced Cardiovascular Disease." Toxicological Sciences 177, no. 2 (2020): 392–404. http://dx.doi.org/10.1093/toxsci/kfaa113.
Full text